Share This Article:

Analysis of Causes and Actual Events on Electric Power Infrastructure Impacted by Cyber Attack

Abstract Full-Text HTML Download Download as PDF (Size:281KB) PP. 77-84
DOI: 10.4236/jpee.2015.34012    2,911 Downloads   3,417 Views  

ABSTRACT

With the development of electric power technology, information technology and military technology, the impact of cyber attack on electric power infrastructure has increasingly become a hot spot issue which calls both domestic and foreign attention. First, main reasons of the impact on power infrastructure caused by cyber attack are analyzed from the following two aspects: 1) The dependence of electric power infrastructure on information infrastructure makes cyber attack issues in information field likely to affect electric power field. 2) As regards to the potential threat sources, it will be considerably profitable to launch cyber attacks on electric power infrastructure. On this basis, this paper gives a classified elaboration on the characteristics and the possibilities of cyber attacks on electrical infrastructures. Finally, the recently published actual events of cyber attacks in respect of threat sources, vulnerabilities and assaulting modes are analyzed and summarized.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Yin, H. , Xiao, R. and Lv, F. (2015) Analysis of Causes and Actual Events on Electric Power Infrastructure Impacted by Cyber Attack. Journal of Power and Energy Engineering, 3, 77-84. doi: 10.4236/jpee.2015.34012.

References

[1] Cleveland, F. (2006) IEC TC57 Security Standards for the power system’s Information Infrastructure—Beyond Simple Encryption. IEEE PES TD 2005/2006, 21-24 May 2006, 1079-1087.
[2] Lin, C., Wang, Y. and Li, Q.L. (2005) Stochastic Modeling and Evaluation for Network Security. Chinese Journal of Computers, 28, 1943-1956.
[3] Niu, P.C., Kang, J.T., Li, A.W. and Li, L. (2010) New Operation Form of Power Network Started by Smart Grid. Power System Protection and Control, 38, 240-244.
[4] Li, W.W., You, W.X. and Wang, X.P. (2011) Survey of Cyber Security Research in Power System. Power System Protection and Control, 39, 140-147.
[5] Watts, D. (2003) Security & Vulnerability in Electric Power Systems. IEEE 35th North American Power Symposium Conference, Rolla Missouri USA, 20-21-19 October 2003, 559-566.
[6] Lewis, J.A. (2011) The Electrical Grid as a Target for Cyber Attack. http://csis.org/files/publication/100322_ElectricalGridAsATargetforCyberAttack.pdf
[7] Kelic, A., Warren, D.E. and Philips, L.R. (2011) Cyber and Physical Infrastructure Interdependence. http://prod.sandia.gov/techlib/access-control.cgi/2008/086192.pdf
[8] Anderson, R.S. (2011) Cyber Security and Resilient Systems. http://www.inl.gov/technicalpublications/Documents/4311316.pdf
[9] Department of Homeland Security Office of Cyber Security and Communications National Cyber Security Division (2011) National Cyber Exercise: Cyber Storm. http://cryptome.org/cyberstorm.pdf
[10] China News Network (2011) Iranian Officials Have Accused the USA and Israel Manufacture of Computer Viruses Destroy Iranian Nuclear Facilities. http://www.chinanews.com/gj/2011/04-17/2977981.shtml
[11] Headquarters Department of the Army Washington, DC (2011) Infrastructure Risk Management (Army). http://www.apd.army.mil/pdffiles/r525_26.pdf
[12] State Electricity Regulatory Commission (2004) Power Monitoring System Security Requirements. Beijing.
[13] Rinaldi, S.M., Peerenboom, J.P. and Kelly, T.K. (2001) Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies. IEEE Control Systems, 21, 11-25. http://dx.doi.org/10.1109/37.969131
[14] Liu, J.F., Chen, C.P. and Luo, J. (2004) Design and Application of Information’s Security and Protection in Power Supervision and Control Automatic System. Relay, 32, 33-35.
[15] Wu, G.W. (2007) Information Disposal and Network Security Analysis in Digital Substation. Relay, 35, 18-22.
[16] Du, G.H. and Wang, Z.F. (2010) Design and Research on Power Network Dispatching Integration of Smart Grid. Power System Protection and Control, 38, 127-131.
[17] Stamp, J. and Mcintyre, A. (2009) Reliability Impacts from Cyber Attack on Electric Power Systems. The 2009 Power Systems Conference and Exposition, Seattle, 15-18 March 2009, 1-8.
[18] Tatum, M. (2011) What Is a Cyber attack? http://www.wisegeek.com/what-is-a-cyberattack.htm
[19] Subs-tations Committee of the IEEE Power Engineering Society (2008) IEEE Guide for Electric Power Substation Physical and Electronic Security, IEEE Std 1402-2000(R2008). USA.
[20] IEC TS 62351-1 (2007) Power Systems Management and Associated Information Exchange—Data and Communications Security Part I: Communication Network and System Security—Introduction to Security Issues. Geneva.
[21] Li, J. (2011) Academician Disclose the Cyber Attack Is Very Serious in China. http://society.people.com.cn/GB/1062/9343749.html
[22] Mu, L.H., Zhu, G.F. and Zhu, J.R. (2010) Design of Intel-ligent Terminal Based on Smart Grid. Power System Protection and Control, 38, 53-56.
[23] Han, Y.J., Zhao, N.Q. and Liu, Y.C. (2005) Destructive Mechanism of Blackout Bomb and Its Defending Measures Ordnance Material Science and Engineering, 28, 57-60.
[24] Zhang, Y.Q. (2011) Network Attack and Defense Technology. Tsinghua University Press, Beijing, 59-65.
[25] Baigent, D., Adamiak, M. and Mackiewicz, R. (2011) IEC61850 Communication Networks and Systems in Substations: An Overview for Users. http://www.sisconet.com
[26] Negrete-Pincetic, M., Yoshida, F. and Gross, G. (2009) Towards Quantifying the Impacts of Cyber Attacks in the Competitive Electricity Market Environment. Bucharest Power Tech Conference, Romania, 28 June-2 July 2009, 105- 111.
[27] Liu, N., Zhang, J.H. and Duan, B. (2009) Design of Security Mechanism for Substation Remote Configuration Based on XML Security. Electric Power Automation Equipment, 29, 113-117.
[28] Taylor, C., Krings, A. and Foss, J.A. (2011) Risk Analysis and Probabilistic Survivability Assessment (RAPSA): An Assessment Approach for Power Substation Hardening. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.80.8323&rep=rep1&type=pdf
[29] Hu, Y., Xie, X.R., Han, Y.D., et al. (2005) A Survey to Design Method of Security Architecture for Power Information Systems. Power System Technology, 29, 35-39.
[30] Greenberg, A. (2011) Congress Alarmed at Cyber-Vulnerability of Power Grid. http://www.forbes.com/2008/05/22/cyberwar-breach-government- tech-security_cx_ag_0521cyber.html
[31] Meserve, J. (2011) Staged Cyber Attack Reveals Vulnerability in Power Grid. http://articles.cnn.com/2007-09-26/us/power.at.risk_1_generator-cyber-attack-electric-infrastructure?_s=PM:US
[32] Poulsen, K. (2011) Report: Cyber Attacks Caused Power Outages in Brazil. http://www.wired.com/threatlevel/2009/11/brazil/
[33] Oman, P., Schweitzer, E. and Roberts, J. (2011) Protecting the Grid from Cyber Attack Part I: Recognizing Our Vulnerabilities. http://www.elp.com/index/display/article-display/130136/articles/utility-automation-engineering-td/volume-6/issue-7/features/protecting-the-grid-from-cyber-attack-part-i-recognizing-our-vulnerabilities.html
[34] Wikipedia (2011) Stuxnet. http://en.wikipedia.org/wiki/Stuxnet

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.